Improving Intrusion Detection with Adaptive Support Vector Machines

被引:5
|
作者
Macek, N. [1 ]
Dordevic, B. [2 ]
Timcenko, V. [2 ]
Bojovic, M. [3 ]
Milosavljevic, M. [4 ]
机构
[1] Sch Elect Engn & Comp Appl Studies, Belgrade 11000, Serbia
[2] Inst Mihailo Pupin Doo, Belgrade 11060, Serbia
[3] IT011, Belgrade 11070, Serbia
[4] Singidunum Univ, Belgrade 11000, Serbia
关键词
Intrusion detection; machine learning; support vector machines; false negative rate; SELECTION;
D O I
10.5755/j01.eee.20.7.8025
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The research topic that this paper is focused on is intrusion detection in critical network infrastructures, where discrimination of normal activity can be easily corrected, but no intrusions should remain undetected. The intrusion detection system presented in this paper is based on support vector machines that classify unknown data instances according both to the feature values and weight factors that represent importance of features towards the classification. The major contribution of the proposed model is significantly decreased false negative rate, even for the minor categories that have a very few instances in the training set, indicating that the proposed model is suitable for aforementioned environments.
引用
收藏
页码:57 / 60
页数:4
相关论文
共 50 条
  • [1] Application of weighted support vector machines to network intrusion detection
    Jia, YS
    Jia, CY
    Qi, HW
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1025 - 1029
  • [2] Biased support vector machines and kernel methods for intrusion detection
    Yendrapalli, K.
    Mukkamala, S.
    Sung, A. H.
    Ribeiro, B.
    WORLD CONGRESS ON ENGINEERING 2007, VOLS 1 AND 2, 2007, : 321 - +
  • [3] Intrusion Detection using An Ensemble of Support Vector Machines
    Kumar, G. Kishor
    Kumar, R. Raja
    Basha, M. Suleman
    Reddy, K. Nageswara
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, : 266 - 275
  • [4] Intrusion detection Based on Fuzzy support vector machines
    Du Hongle
    Teng Shaohua
    Zhu Qingfang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 639 - +
  • [5] Application of Improved Support Vector Machines in Intrusion Detection
    Zhang, Yongli
    Zhu, Yanwei
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 56 - 59
  • [6] High Efficient Intrusion Detection Methodology with Twin Support Vector Machines
    Ding, Xuejun
    Zhang, Guiling
    Ke, Yongzhen
    Ma, Baolin
    Li, Zhichao
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 560 - +
  • [7] Intrusion Detection For Controller Area Network Using Support Vector Machines
    Tanksale, Vinayak
    2019 IEEE 16TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS WORKSHOPS (MASSW 2019), 2019, : 121 - 126
  • [8] Features Selection for Intrusion Detection Systems Based on Support Vector Machines
    Zaman, Safaa
    Karray, Fakhri
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1066 - 1073
  • [9] Support vector machines with immune clonal parameter optimized for intrusion detection
    Department of Computer Science and Technology, North China Institute of Science and Technology, Beijing 101601, China
    J. Comput. Inf. Syst., 2008, 4 (1357-1363):
  • [10] Support vector machines for anomaly detection
    Zhang, Xueqin
    Gu, Chunhua
    Lin, Jiajun
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 2594 - +